How to catch a hacker - l Monitor event logs and all...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 4/18/11 How to catch a hacker
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/18/11 Step #1 Create a fake employee account and exclusively monitor records of the hacker logging into the false account. l Have a program that alerts you of when the fake account is hacked into and is logged onto.
Background image of page 2
4/18/11 Step #2 Find out what type of information the hacker is looking for.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: l Monitor event logs and all movements of the hacker. l Find commonality of the accounts into which the hacker logs into and looks at. Ex. Payroll files, employee files, emails, ect. 4/18/11 Who should be involved? Security Department l Human Resources l Payroll Department l IT Department l FBI possibly depending on severalty of hacker....
View Full Document

This note was uploaded on 04/17/2011 for the course COMPUTER S 101 taught by Professor Xxx during the Spring '11 term at Holy Family University.

Page1 / 4

How to catch a hacker - l Monitor event logs and all...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online